Abstract

The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes are designed. In this work, a simple method is presented that serves both ways. This method is based on composition of the action of symmetric group on Galois field and inversion map. This construction method provides a large number of highly non-linear substitution permutation boxes having the property of confusion as well as diffusion. These substitution permutation boxes have all the cryptography properties. Their utilization in the image encryption application is measured by majority logic criterion. We named these newly designed substitution boxes (S-boxes) as substitution permutation boxes (S-p-boxes), because they serve as both substitution boxes (S-boxes) as well as permutation boxes (p-boxes).

Highlights

  • Cryptography techniques have been utilized in different areas

  • A simple and innovative method is suggested for the construction of S-p-boxes in an unconstraint system as compared to linear fractional and affine transformation

  • The proposed S-p-box has an additional property of diffusion as well

Read more

Summary

Introduction

Cryptography techniques have been utilized in different areas In this era, due to progress in computer and communication technology have facilitated mankind to transfer important personal data through the long-distance channels. The symmetric (private) and asymmetric (public) key cryptography are two most trusted cryptographic models for secure communication. Both methodologies have several benefits and drawbacks as well. Symmetric key cryptography algorithms have two types These types are block ciphers and stream ciphers. Like DES, advanced encryption standard (AES), and international data encryption algorithm (IDEA), play an important role in multimedia security. The substitution box and permutation box are the two most indispensable parts of a secure block cipher.

Related Work
Preliminaries
Design for Proposed S-p-Boxes
Algebraic Analysis and Simulation Results
Nonlinearity
A Boolean
Graphical
Linear Approximation Probability
Differential
Statistical
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call